cloud computing

Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading →

All too often, cloud service providers (CSPs) fail to follow a systematic, comprehensive approach to security as they create and update their service rapidly. Using agile development practices, they gain productivity, but often fail in security diligence – that is,… Continue reading →

In a briefing at RSA Conference, FireHost CEO and Founder Chris Drake said his service was more secure than competitors’ and that this year he would take off the gloves to expose “the industry’s dirty little secret.”

“Cloud Computing: Who is in Control?” This was one of my all-time favorite posts from more than four years ago. Then at Burton Group, I’d become the cloud security analyst just as the technology industry, still reeling from the Great… Continue reading →

We founded and ran the Burton Group identity management and security consulting practices closely-mapped to Reference Architecture decision support frameworks. After performing hundreds of engagements for Global 1000 companies, universities and government entities we now bring our expertise and industry connections to Security Architects Partners and its clients.

Our mission is to deliver high-quality security consulting and education services to enterprise security clients within commercial organizations, higher-education, government and solution provider environments through a team of expert and trusted security architects.